Subscriber Identification Module is also possible to store contacts on many Subscriber Identification Module cards.

Subscriber Identification Module cards are always used on GSM phones; for CDMA phones, they are only needed for newer LTE-capable handsets. Subscriber Identification Module cards can also be used in satellite phones.

Subscriber Identification Modules are designed to be transferable between different Mobile Devices.

The Hierarchical organized File System of a Subscriber Identification Module resides in persistent memory and stores data as names and phone number entries, text messages, and network service settings. The File System consists of three types of files:

The master file is the root of the File System. Dedicated files are the subordinate directories of master files. Elementary files contain various types of data, structured as either a sequence of data bytes, a sequence of fixed-size records, or a fixed set of fixed-size records used cyclically.

SIM cards have built-in security features. The three file types, MF, DF, and EF, contain the security attributes. These security features filter every execution and allow only those with proper authorization to access the requested functionality. There are different levels of access conditions in DF and EF files. They are:

Always—This condition allows to access files without any restrictions.

Card holder verification 1 (CHV1)—This condition allows access to files after successful verification of the user’s PIN or if PIN verification is disabled.

Card holder verification 2 (CHV2)—This condition allows access to files after successful verification of the user’s PIN2 or if the PIN2 verification is disabled.

Administrative (ADM)—The card issuer who provides SIM to the subscriber can access only after prescribed requirements for administrative access are fulfilled.

Never (NEV)—Access of the file over the SIM/ME interface is forbidden.

The SIMOperating System uses Access Control to an element of the file system based on its access condition and the type of action being attempted. The Operating System allows only limited number of attempts, usually three, to enter the correct CHV before further attempts are blocked. For unblocking, it requires a PUK code, called the PIN unblocking key, which resets the CHV and attempt counter. If the subscriber is known, then the unblock CHV1/CHV2 can be easily provided by the Mobile Network Operator.

The SIM and UICC card contains sensitive information about the subscriber. Data such as contact lists and messages can be stored in Subscriber Identification Module. SIM cards themselves contain a repository of data and information, some of which is listed below: